STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to MS SQL Server 2014 Instance Security Technical Implementation Guide

V-213875

CAT II (Medium)

SQL Server must disable communication protocols not required for operation.

Rule ID

SV-213875r961470_rule

STIG

MS SQL Server 2014 Instance Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-001762

Discussion

Having unnecessary protocols enabled exposes the system to avoidable threats. In a typical installation, only TCP/IP will be required.

Check Content

Review the system security plan to determine the communication protocols used by the SQL Server instance.

Open SQL Server Configuration Manager from the Windows Start menu or by entering "SQLServerManager12.msc" in a Command Prompt window or in the Run dialog box.  Select SQL Server Network Configuration >> Protocols for <instance name>.  Review the list of protocols.

If any that are not required are shown as enabled, this is a finding.

Fix Text

In SQL Server Configuration Manager, right-click on each enabled protocol that is not required.  Select Disabled.

Close SQL Server Configuration Manager.  Restart SQL Server.